Your message dated Sat, 26 Mar 2022 11:59:13 +0000
with message-id
<c4d20274f6d76a43fb574d2177f6e3af4235e4be.ca...@adam-barratt.org.uk>
and subject line Closing p-u requests for updates in 11.3
has caused the Debian Bug report #1007947,
regarding bullseye-pu: package phpliteadmin/1.9.8.2-1+deb11u1
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1007947: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007947
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian....@packages.debian.org
Usertags: pu
Dear Stable Release Managers,
Salvatore Bonaccorso on the Security Team suggested me to fix a revealed
XSS vulnerability trough the upcoming point release. The issue has got
the assigned number CVE-2021-46709. The proposed fix is a trivial one-
liner patch casting $_GET['newRows'] to (int).
[ Checklist ]
[x] *all* changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in (old)stable
[x] the issue is verified as fixed in unstable
[ Changes ]
phpliteadmin (1.9.8.2-1+deb11u1) bullseye; urgency=medium
.
* Fix CVE-2021-46709, an XSS issue with the newRows GET parameter.
diffstat for phpliteadmin-1.9.8.2 phpliteadmin-1.9.8.2
changelog | 6 ++++++
patches/Fix-newRows-XSS.patch | 18 ++++++++++++++++++
patches/series | 1 +
3 files changed, 25 insertions(+)
diff -Nru phpliteadmin-1.9.8.2/debian/changelog
phpliteadmin-1.9.8.2/debian/changelog
--- phpliteadmin-1.9.8.2/debian/changelog 2019-09-18 18:20:28.000000000
+0300
+++ phpliteadmin-1.9.8.2/debian/changelog 2022-03-19 09:25:56.000000000
+0300
@@ -1,3 +1,9 @@
+phpliteadmin (1.9.8.2-1+deb11u1) bullseye; urgency=medium
+
+ * Fix CVE-2021-46709, an XSS issue with the newRows GET parameter.
+
+ -- Nicholas Guriev <guriev...@ya.ru> Sat, 19 Mar 2022 09:25:56 +0300
+
phpliteadmin (1.9.8.2-1) unstable; urgency=medium
* New upstream release.
diff -Nru phpliteadmin-1.9.8.2/debian/patches/Fix-newRows-XSS.patch
phpliteadmin-1.9.8.2/debian/patches/Fix-newRows-XSS.patch
--- phpliteadmin-1.9.8.2/debian/patches/Fix-newRows-XSS.patch 1970-01-01
03:00:00.000000000 +0300
+++ phpliteadmin-1.9.8.2/debian/patches/Fix-newRows-XSS.patch 2022-03-19
09:21:01.000000000 +0300
@@ -0,0 +1,18 @@
+Description: Fix an XSS vulnerability with the newRows GET parameter
+ Forcibly cast value to integer. CVE-2021-46709
+Bug: https://bitbucket.org/phpliteadmin/public/issues/399/xss-vulnerability
+Forwarded:
https://bitbucket.org/phpliteadmin/public/pull-requests/16/fix-an-xss-vulnerability-with-the-newrows
+Author: Nicholas Guriev <guriev...@ya.ru>
+Last-Update: Sat, 19 Mar 2022 09:21:01 +0300
+
+--- a/index.php
++++ b/index.php
+@@ -2613,7 +2613,7 @@ if(isset($_GET['action']) && !isset($_GE
+ echo
$params->getForm(array('action'=>'row_create','confirm'=>'1'), 'post', true);
+ $tableInfo = $db->getTableInfo($target_table);
+ if(isset($_GET['newRows']))
+- $num = $_GET['newRows'];
++ $num = (int)$_GET['newRows'];
+ else
+ $num = 1;
+ echo "<input type='hidden' name='newRows'
value='".$num."'/>";
diff -Nru phpliteadmin-1.9.8.2/debian/patches/series
phpliteadmin-1.9.8.2/debian/patches/series
--- phpliteadmin-1.9.8.2/debian/patches/series 2019-09-18 18:20:28.000000000
+0300
+++ phpliteadmin-1.9.8.2/debian/patches/series 2022-03-19 09:21:01.000000000
+0300
@@ -1,2 +1,3 @@
Remove-spontaneous-access-to-Internet.patch
Remove-using-build-date.patch
+Fix-newRows-XSS.patch
signature.asc
Description: This is a digitally signed message part
--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 11.3
Hi,
The updates referenced by these bugs were included in stable as part of
this morning's 11.3 point release.
Regards,
Adam
--- End Message ---